Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
eab740da305938b9a22b1bb21f913139_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab740da305938b9a22b1bb21f913139_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab740da305938b9a22b1bb21f913139_JaffaCakes118.html
-
Size
62KB
-
MD5
eab740da305938b9a22b1bb21f913139
-
SHA1
8e86ed4822322f4ee6c31f2312680861a4c4e7d2
-
SHA256
64e97c0b7237e6fc9d23b87c430ffaba5d8d8e36ae6bd4a2a07fd0c4144840be
-
SHA512
9a3ba87fe7517c8ab015eeff1fbff8d1ed149ee5381b89f2de47e00236dde515882a219d16f3183e690073f9f05de400ccba1200180bbc4df05a494b64a0e27f
-
SSDEEP
1536:GuvWKlgGW5nhqkeIwedUePqvtCXeAAfaYv8KhE0pOzdhz:9WKeGWvAfaYv8ME0pOvz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3252 msedge.exe 3252 msedge.exe 4452 identity_helper.exe 4452 identity_helper.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 3400 3252 msedge.exe 83 PID 3252 wrote to memory of 3400 3252 msedge.exe 83 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 1508 3252 msedge.exe 84 PID 3252 wrote to memory of 3616 3252 msedge.exe 85 PID 3252 wrote to memory of 3616 3252 msedge.exe 85 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86 PID 3252 wrote to memory of 1972 3252 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab740da305938b9a22b1bb21f913139_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb974046f8,0x7ffb97404708,0x7ffb974047182⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2004 /prefetch:12⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,4786309967335542455,7417927335671869436,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:32
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6001bddb-8167-41e7-a803-a593a14f274b.tmp
Filesize6KB
MD5a3f30e2c657311e81b38e536101f2e12
SHA1addd75b75508e8809c4bc503dcb80c6cdba4ee82
SHA256406ebf06e25b360f97c185a2e9e89db896ff129898a970d3a3af42878b629827
SHA5128982f3893b30f7235a2fe933f8cedb0f264ce38ba06343a441617057731563a7acde05e7301df217c581e08e9cc6f62f24e95f62a9dd04d80626145a54e05a1d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56b2cab9df5de7506e5371ce8dbe299fd
SHA187b153eebfc09078f814446072f7ffef857dddc4
SHA256315c46c72ce013238b068eed54bd8d0b9a8b3a621ec41d36af4ef95a942cf76e
SHA512aa822f2a6e0bc03813b214bda4f3a02be12d67cd32bfd8216b606b1b25cb9fe7ac01abb0cb494e6e0343f91e54f2c4a10a6a1f9467f9d82feb12f5aeda286176
-
Filesize
1KB
MD5f51feb8f6c245cd816f641aed325a27a
SHA1af8eff169d3c19a5b445d473c2f4f49c7e31ead2
SHA256673945a6f094d71fc8dc24aea43a59cd56456a360aba4a2a3a3256380377d97d
SHA5120f20d45679d96c0d0dc5bbb631c3811bdff3cc0ad3466732b37d657ff83fe839bf985dcd9807b3768375c8b5bda2170d85c9e6cff097d6693a302862ff209c69
-
Filesize
6KB
MD5cf13020163bff61d8379aeaceb2aae97
SHA19784c18d409795ca9a3b20e2345f475b375b83ee
SHA256d4a80797823a6e9a3f14f7a91f0f3e9f91a530eb3511dfe263ed7a437192d708
SHA512367b72a7630a2586b734c866c9aab2a22564a12e2860515d20a5fb0b4dfa15fcd356e7c0f1c08bb4689a543ab18ecb0a79e90620d5bdff1532d4a689a03d715d
-
Filesize
868B
MD5a91e3b30fc65f753337bc4eff6588b70
SHA18931a6b7c403e77a4c33cdb04f69ce8dbec9f13c
SHA256ee0413027c53fdb61b38a7d9976dea766d3ac327c51a78dbeeeb6e76c9628f58
SHA512d89265990f8d5e02b80d452e8e3beff131967b1141428b03991084d124fcc399f487536e3c81ba18bbdb4ba7676b3c1605a0a6ef18d43736da2fa5a52e23d4d8
-
Filesize
868B
MD59fdc69914b4d80d74594f488afe97190
SHA194c0adfe8d06554461d024128e0caa2ad09e7887
SHA2563d92d5b6f365d7fad719077d46e39e97c53fb329eab7856311dadfdf747bdaf6
SHA512fb6f3723b6f387a2c1c1a584b00ae16d2b949812383aabf5ddfac12eac9fd2def3cc31a88fd94ade4d9741a4bebc1908021e7a7d066ed422d2ac6d1356103c33
-
Filesize
203B
MD5efa6c649b87b698491b53b3d0cfb423c
SHA1e687861dc58e9b6eac1da3a6fa669b8245bfbc27
SHA2569e1c3dd32f483a300a6b4cc227818f112f195e72a569c1bdf4061ae371f03c91
SHA512a7904bd2b86f77925cab155becd1f0b79a1e30e840efa7bb009f6f3a2077f8f253b4cd9397a7fc15215788ebdfe8ba1103db2087b5641bfd144158b97a8ce6ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\fa401472-4b4a-4528-b850-a7d84ec95cd4.tmp
Filesize5KB
MD5c8e242bde0ce1e27fa9d9424079c4fd3
SHA1539a15738aee9632b763735c31ed80549b62b7ed
SHA256f4d4b67220c7be6135c884934c0b4f0cfb7edfa593e70bb438793b7c3303fdeb
SHA5128a7fbbaafad0c3cadf36cf6c4ede2b37c367c052f66ea553c64bab590807ae48644c679a69f0d2394614990743ab0a00d9714f0e75cdffcab428970caf8e82b0
-
Filesize
10KB
MD59ed568804972bab1bcdfdd113d001fe9
SHA152d553a846def3c557ac22df006c2a9b491d3880
SHA256dedd34b43e0edaa1a2cfe952627e410a3da157fa9db72d3ccb260032fbec50a9
SHA51288db228a6af6dd816a01b716713821ae224a1661b1d6019c8e718a48dbb4c36080ec7e18b8d354c34be24cd91f87d183a100019927eae30f84db99bd7d4e36e2